Protection Schemes
The protection scheme can be selected during encryption using the --protectionScheme
flag. During migration, the former protection scheme is specified using the --oldProtectionScheme
flag. This distinction allows a set of protected configuration files to be migrated not only to a new key, but to a completely different protection scheme.